Cybersecurity

  1. Cybersecurity Threats and Vulnerabilities
    1. Types of Threat Actors
      1. Hackers
        1. Script Kiddies
          1. Use of premade scripts or tools
            1. Limited technical expertise
            2. Hacktivists
              1. Motivated by political or social causes
                1. Use of cyber tactics to spread messages or disrupt services
                2. Black Hat Hackers
                  1. Engage in illegal cyber activities for profit
                    1. Exploit vulnerabilities for personal gain
                    2. White Hat Hackers
                      1. Ethical hackers who find and report vulnerabilities
                        1. Conduct security assessments for organizations
                        2. Grey Hat Hackers
                          1. Operate in the ambiguous area between white and black hat activities
                            1. May exploit vulnerabilities but inform victims afterward
                          2. Insider Threats
                            1. Malicious Insiders
                              1. Employees or contractors with intent to harm
                                1. Data theft or sabotage
                                2. Unintentional Insiders
                                  1. Human errors leading to data breaches
                                    1. Lack of cybersecurity awareness
                                  2. Nation-State Actors
                                    1. State-Sponsored Hackers
                                      1. Targeted attacks on other nations or corporations
                                        1. Use of advanced persistent threats (APTs)
                                        2. Cyber Espionage
                                          1. Stealing sensitive data for political or military advantage
                                            1. Focus on critical infrastructure and governmental data
                                          2. Cybercriminals
                                            1. Organized Crime Groups
                                              1. Highly organized and financially motivated
                                                1. Ransomware campaigns and financial fraud
                                                2. Lone Wolf Attackers
                                                  1. Individuals acting independently
                                                    1. May commit identity theft or credit card fraud
                                                3. Vulnerability Management
                                                  1. Vulnerability Assessment
                                                    1. Identification of vulnerabilities in systems and networks
                                                      1. Use of automated tools and manual review
                                                        1. Importance of regular assessment scheduling
                                                        2. Penetration Testing
                                                          1. Ethical hacking to identify exploitable weaknesses
                                                            1. Simulation of real-world cyber attacks
                                                              1. Report findings to improve security measures
                                                              2. Patch Management
                                                                1. Regularly updating software to fix security vulnerabilities
                                                                  1. Importance of timely patch deployment
                                                                    1. Automated vs. manual patch management processes
                                                                    2. Security Information and Event Management (SIEM)
                                                                      1. Centralized logging and reporting of security events
                                                                        1. Real-time analysis for threat detection
                                                                          1. Integration with incident response workflows
                                                                        2. Cyber Attack Vectors
                                                                          1. Email
                                                                            1. Phishing Attacks
                                                                              1. Deceptive emails to steal credentials or deploy malware
                                                                                1. Spear phishing targeting specific individuals or organizations
                                                                                2. Business Email Compromise (BEC)
                                                                                  1. Fraudulent emails appearing to be from trusted sources
                                                                                    1. Targeted attacks on corporate emails for theft
                                                                                  2. Web
                                                                                    1. Drive-by Downloads
                                                                                      1. Unintentionally downloading malware from compromised websites
                                                                                      2. Cross-Site Scripting (XSS)
                                                                                        1. Injection of scripts into web pages to exploit user data
                                                                                          1. Persistent vs. Non-persistent XSS
                                                                                        2. Mobile
                                                                                          1. Mobile Malware
                                                                                            1. Malicious software targeting mobile devices
                                                                                              1. Apps that request excessive permissions
                                                                                              2. SIM Swapping
                                                                                                1. Hijacking phone numbers to access accounts
                                                                                                  1. Used for bypassing two-factor authentication
                                                                                                2. Internet of Things (IoT)
                                                                                                  1. Device Vulnerabilities
                                                                                                    1. Weak default credentials on IoT devices
                                                                                                      1. Lack of firmware updates
                                                                                                      2. Botnets
                                                                                                        1. Network of compromised IoT devices used for massive attacks
                                                                                                          1. Example: DDoS attacks exploiting IoT networks
                                                                                                            1. Device management challenges in diverse environments